Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
30bb1018b4b56f290ccdd572cf9758b7_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30bb1018b4b56f290ccdd572cf9758b7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30bb1018b4b56f290ccdd572cf9758b7_JaffaCakes118.html
-
Size
22KB
-
MD5
30bb1018b4b56f290ccdd572cf9758b7
-
SHA1
6eeb32ef6913f450ed3685a9b12573e6abc88d40
-
SHA256
9499a7e55f23f16d2ffafe458cd880022c710a24552d972c653132c7f10e0e0e
-
SHA512
9a6856e668fc8bd0b4e7c93aea473e1f439b79666752d50cce793092548dde6b8cf62ee250d19d1866b9f02909651426cf9637a2a53521888c3941f86a84d9de
-
SSDEEP
384:bankGihsLimyVUqiSiDfQ3akZT1nmm8OuZwbwpfwRtyV6yV6yVQAhyV9skkUg+Ql:bankGihsLimyVY7DfQFd9mZ8yV6yV6yl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4236 msedge.exe 4236 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 1020 4236 msedge.exe 83 PID 4236 wrote to memory of 1020 4236 msedge.exe 83 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 1320 4236 msedge.exe 84 PID 4236 wrote to memory of 4368 4236 msedge.exe 85 PID 4236 wrote to memory of 4368 4236 msedge.exe 85 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86 PID 4236 wrote to memory of 3744 4236 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30bb1018b4b56f290ccdd572cf9758b7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb0d646f8,0x7ffcb0d64708,0x7ffcb0d647182⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,2129924890078278173,10531629501144819431,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,2129924890078278173,10531629501144819431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,2129924890078278173,10531629501144819431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2129924890078278173,10531629501144819431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2129924890078278173,10531629501144819431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2129924890078278173,10531629501144819431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1944 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2129924890078278173,10531629501144819431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,2129924890078278173,10531629501144819431,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
2KB
MD5c07a6c266d7325d061512ca007edaf9b
SHA179fd74fd7091143e13a18875cfe0fa1550954da1
SHA256f2489e757078af01a909676fd7e9cdc3aff77a5dbb1606fbfe361dc80c9e1dfa
SHA5125195d4b932f46f9ae6ed6670faf087288d27bff1810680398de373330c3d3a021cec3768113e3c37f22f383abb06b04ceb0d1f2b6f985b5728d1ae2396d878b0
-
Filesize
6KB
MD5312fa16522ee7f1a56cb9d185b62cda7
SHA194646530495e6002e433771ff4ec2b2063abb456
SHA256a5bc6d7b14dd69ea57bb7b9184fbb3e3ac6b0cce4219c3f5d6edd296349bc968
SHA512f973ca2a5eda9dca966586c9a8e8acf260f1995ee62793aad59546e31c637950191d7eec676d2087ce562c3f454784cbf357a010675f84fcd2bccbe0641828c6
-
Filesize
6KB
MD5868cea3604a3fb29003e024b95d8de5b
SHA12dd9eb615a85ebea36ca3f64ca354c8adb5d1f14
SHA2565dd26617c06d7767bd42febe75cbe17a8cfe44e3fd5b9049d06fb946169d5b55
SHA5127cac4354be2fabd2d141e3aa73b0468b9f2fcc774e85f390f0eb27e52521b9c34f55b6e4a6f431872f5cf2f4514adc50b49b56be9f85d21a360865105237a51a
-
Filesize
10KB
MD52c49d2ba6545fdb7e067911ecf04f52d
SHA173436c6345640baa0171b2d91bb65d0e993f80c0
SHA256ce10d61f99858a3c71ac6dc0f73f5d70f85af13eff00f1b0e07d9b7aa418b49f
SHA51289003f3c650c9d26f58e0462104037a2f2d154f50761c9fc2613bf7b3a6ebc4cadf069a8f335b1213b1f5cc8b3ff411fc7fd1486312ee2e77a5358693a8251f3